Host & Network Penetration Testing: Exploitation
Last updated
Last updated
Introduction To Exploitation
Vulnerability Scanning
Searching For Exploits
Fixing Exploits
Bind & Reverse Shells
Exploitation Frameworks: Se realizara con Metasploit y powershell
Windows Exploitation: Pruebas de caja negra.
Linux Exploitation: Pruebas de caja negra.
AV Evasion & Obfuscation: Evacion del antivirus.
Prerequisites
Basic familiarity with TCP & UDP
Basic familiarity with Linux & Windows
Basic familiarity with Metasploit
Learning Objectives:
Students will get an introduction to the exploitation phase of a penetration test.
Students will learn how to identify vulnerable services running on a target system.
Students will learn how to search for, modify and compile publicly available exploit code.
Students will get an understanding of how bind and reverse shells work.
Students will get an understanding of the various exploitation frameworks available as well as how they can be used to streamline exploitation.
Students will learn how to exploit both Windows & Linux systems in a simulated black box penetration test.
Students will learn how to evade signature based AV solutions.